Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols
نویسندگان
چکیده
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy quantum channel, then the raw key has to be processed to reduce the information of a spy down to an arbitrarily low value, providing Alice and Bob with a secret key. In principle, quantum algorithms as well as classical algorithms can be used for this processing. A natural question is: Up to which error rate on the raw key is a secret-key agreement at all possible? Under the assumption of incoherent eavesdropping, we find that the quantum and classical limits are precisely the same: As long as Alice and Bob share some entanglement, both quantum and classical protocols provide secret keys.
منابع مشابه
Linking Classical and Quantum Key Agreement: Is There "Bound Information"?
After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Alice and Bob must process the raw key in order to end up with identical keys about which the adversary has virtually no information. In principle, both classical and quantum protocols can be used for this processing. It is a natural question which type of protocols is more powerful. We show that t...
متن کاملua nt - p h / 00 05 04 2 v 1 1 1 M ay 2 00 0 Linking Classical and Quantum Key Agreement : Is There “ Bound Information ” ?
After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Alice and Bob must process the raw key in order to end up with identical keys about which the adversary has virtually no information. In principle, both classical and quantum protocols can be used for this processing. It is a natural question which type of protocols is more powerful. We show that i...
متن کاملInformation-theoretically Secure Secret-key Agreement by Not Authenticated Public Discussion 1
All information-theoretically secure key agreement protocols (e.g. based on quantum cryptography or on noisy channels) described in the literature are secure only against passive adversaries in the sense that they assume the existence of an authenticated public channel. The goal of this paper is to investigate information-theoretic security even against active adversaries with complete control ...
متن کاملError tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication
We investigate the error tolerance of quantum cryptographic protocols using d-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels...
متن کاملPublic and private resource trade-offs for a quantum channel
Collins and Popescu realized a powerful analogy between several resources in classical and quantum information theory. The Collins-Popescu analogy states that public classical communication, private classical communication, and secret key interact with one another somewhat similarly to the way that classical communication, quantum communication, and entanglement interact. This paper discusses t...
متن کامل